AbbySec

My digital playground โ€“ where hacking meets learning.

View on GitHub
25 March 2026

SOC105 โ€“ Malicious URL Access Leading to Trojan Infection

by

๐Ÿง  Summary

This investigation was triggered by a SOC105 โ€“ Requested T.I. URL Address alert involving a connection to a suspicious domain: pssd-ltdgroup.com.

Threat intelligence analysis using VirusTotal revealed that the URL was flagged as malicious by multiple vendors.

Further investigation confirmed that a malicious Excel file (.xlsm) containing VBA macros was downloaded and executed on the endpoint.

The file was identified as a Trojan, and the affected system (BillPRD) was immediately contained.


๐Ÿšจ Alert Overview


๐Ÿ” Investigation Steps

1๏ธโƒฃ URL Analysis

The requested URL was analyzed using VirusTotal:

https://pssd-ltdgroup.com

URL VT Result

โœ… Conclusion: The domain is malicious and likely used for malware delivery.


2๏ธโƒฃ Log Analysis

Raw logs confirmed that the user accessed the malicious URL and downloaded a file.

Evidence:

Request URL: https://pssd-ltdgroup.com

File: Krankheitsmeldung_092020_07.xlsm

Raw Log

โœ… Conclusion: The malicious URL successfully delivered a payload.


3๏ธโƒฃ Endpoint Analysis

The affected host BillPRD showed execution of the downloaded file:

C:\Users\Bill\Desktop\Krankheitsmeldung_092020_07.xlsm

Endpoint Process

โœ… Conclusion: The file was executed by the user โ†’ confirms user-driven infection.


4๏ธโƒฃ File Analysis (Malware Confirmation)

The file hash was analyzed on VirusTotal:

Key indicators:

Tags observed:

File VT Result

โœ… Conclusion: Confirmed Trojan malware delivered via malicious Excel macro document.


๐Ÿงฌ MITRE ATT&CK Mapping

Tactic Technique
Initial Access T1566.001 โ€“ Phishing: Spearphishing Attachment
Execution T1204.002 โ€“ User Execution: Malicious File
Execution T1059.005 โ€“ Command and Scripting Interpreter (VBA)
Defense Evasion T1027 โ€“ Obfuscated Files or Information
Command & Control T1071.001 โ€“ Web Protocols

โš ๏ธ Final Verdict

Category Result
URL Reputation Malicious
File Analysis Trojan (Malicious VBA Macro)
User Activity Downloaded & Executed File
Impact System Compromised
Severity High
Verdict โœ… True Positive

๐Ÿ›ก๏ธ Actions Taken


๐Ÿ“Œ Conclusion

This incident demonstrates a classic phishing-based malware delivery attack, where a user accessed a malicious URL that served a weaponized Excel document containing VBA macros.

Upon execution, the file initiated malicious activity consistent with Trojan behavior, confirmed by multiple security vendors.

The attack chain can be summarized as:

Malicious URL โ†’ File Download โ†’ User Execution โ†’ Trojan Infection

Timely detection through threat intelligence and log analysis enabled rapid containment of the affected host, preventing further escalation.

This case highlights the importance of:


tags: